Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices
The heterogeneous nature of the Internet of Things (IoT) requires sophisticated and distributed security schemes for providing reliable communication. However, providing a unanimous security measure is a tedious task for heterogeneous devices is a complex task. This function requires multiple commun...
Saved in:
| Published in | Soft computing (Berlin, Germany) Vol. 25; no. 18; pp. 12131 - 12144 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | English |
| Published |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.09.2021
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1432-7643 1433-7479 |
| DOI | 10.1007/s00500-021-05864-5 |
Cover
| Abstract | The heterogeneous nature of the Internet of Things (IoT) requires sophisticated and distributed security schemes for providing reliable communication. However, providing a unanimous security measure is a tedious task for heterogeneous devices is a complex task. This function requires multiple communication and information sharing constraints to be adapted by connected users. In this article, a distributed multi-party security computation framework for ensuring the security level of scalable information sharing and communications in heterogeneous IoT. This computation framework uses synchronized security measures through recurrent verification on different communicating ends of the devices. In this verification process, backpropagation learning verifies end-to-end security and the communication session between the connected devices. MPC is generally subject to a significant overhead for correspondence but has the benefit of being confidential even if pursued until a substantial percentage of the participants are aggressive and coordinated. Secret MPC exchanging will protect the specifications of both models and the training/inference information. The multi-party verification relies on both device and service providers for unanimously synchronizing the different security computations in a less complex manner. This framework is reliable in mitigating man-in-middle and information loss adversaries. The performance of the proposed method is verified using the metrics detection ratio, response rate, delay, and overhead. |
|---|---|
| AbstractList | The heterogeneous nature of the Internet of Things (IoT) requires sophisticated and distributed security schemes for providing reliable communication. However, providing a unanimous security measure is a tedious task for heterogeneous devices is a complex task. This function requires multiple communication and information sharing constraints to be adapted by connected users. In this article, a distributed multi-party security computation framework for ensuring the security level of scalable information sharing and communications in heterogeneous IoT. This computation framework uses synchronized security measures through recurrent verification on different communicating ends of the devices. In this verification process, backpropagation learning verifies end-to-end security and the communication session between the connected devices. MPC is generally subject to a significant overhead for correspondence but has the benefit of being confidential even if pursued until a substantial percentage of the participants are aggressive and coordinated. Secret MPC exchanging will protect the specifications of both models and the training/inference information. The multi-party verification relies on both device and service providers for unanimously synchronizing the different security computations in a less complex manner. This framework is reliable in mitigating man-in-middle and information loss adversaries. The performance of the proposed method is verified using the metrics detection ratio, response rate, delay, and overhead. |
| Author | Al-Otaibi, Yasser D. |
| Author_xml | – sequence: 1 givenname: Yasser D. orcidid: 0000-0002-1464-8401 surname: Al-Otaibi fullname: Al-Otaibi, Yasser D. email: yalotaibi@kau.edu.sa organization: Department of Information Systems, Faculty of Computing and Information Technology in Rabigh, King AbdulazizUniversity |
| BookMark | eNp9kD1PwzAQhi1UJNrCH2DyCIPBX4mTEZWvSpVYyhwlzrl1aezKdkD994SGiYHp3pPuudM9MzRx3gFC14zeMUrVfaQ0o5RQzgjNilyS7AxNmRSCKKnKySlzonIpLtAsxh0dJlUmpsg-2piCbfoELe76fbLkUId0xBF0H-wQtO8OfaqT9Q6bUHfw5cMHNj7gLSQIfgMOfB-xdUPnIGFvcNpat4n4ZunXt7iFT6shXqJzU-8jXP3WOXp_flovXsnq7WW5eFgRzUuWiBZNAbqlNM9pJltRFrxtDHDJDFdNTnPZykblSjEmeKlr2TasNlTmwI0yvBVzxMe9OvgYA5jqEGxXh2PFaPUjqxplVYOC6iSrygao-ANpO_6cQm33_6NiRONwx20gVDvfBze8-B_1DV4Egwg |
| CitedBy_id | crossref_primary_10_1109_TSC_2024_3376247 crossref_primary_10_3390_electronics12051136 crossref_primary_10_1155_2022_8626882 crossref_primary_10_1109_TDSC_2024_3381959 |
| Cites_doi | 10.1016/j.adhoc.2018.09.007 10.1016/j.future.2019.04.019 10.1109/ACCESS.2019.2936123 10.1007/s11042-017-5548-2 10.1109/ACCESS.2019.2958089 10.1109/ACCESS.2019.2961413 10.1049/trit.2018.1008 10.1016/j.jnca.2020.102633 10.1007/s11227-018-2686-x 10.1007/s40860-018-0062-5 10.1007/s42979-020-00201-3 10.1109/ACCESS.2020.2964038 10.1016/j.adhoc.2020.102253 10.1109/JIOT.2018.2890728 10.1016/j.jnca.2019.102496 10.1109/TSG.2017.2720159 10.1007/s12243-018-00702-6 10.1109/ACCESS.2019.2901375 10.1016/j.simpat.2020.102125 10.1007/s11227-016-1684-0 10.1007/s00607-018-0639-0 10.1109/ACCESS.2018.2847632 10.1016/j.iot.2020.100240 10.1109/ACCESS.2019.2913438 10.1016/j.cose.2018.06.004 10.1016/j.scs.2019.101522 10.1109/ACCESS.2020.2996264 10.1109/JIOT.2020.2964015 10.1007/s10207-019-00484-5 10.4018/978-1-5225-2947-7.ch011 10.1007/s11036-019-01490-6 10.1007/s12652-018-1154-z 10.1007/s10586-019-03036-7 10.1002/ett.3815 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021 |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021 |
| DBID | AAYXX CITATION |
| DOI | 10.1007/s00500-021-05864-5 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1433-7479 |
| EndPage | 12144 |
| ExternalDocumentID | 10_1007_s00500_021_05864_5 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .86 .VR 06D 0R~ 0VY 1N0 1SB 203 29~ 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K7- KDC KOV LAS LLZTM M4Y MA- N2Q NB0 NPVJJ NQJWS NU0 O9- O93 O9J OAM P2P P9P PF0 PT4 PT5 QOS R89 R9I RIG RNI ROL RPX RSV RZK S16 S1Z S27 S3B SAP SDH SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z5O Z7R Z7X Z7Y Z7Z Z81 Z83 Z88 ZMTXR AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO |
| ID | FETCH-LOGICAL-c291t-c3b8ecd0066054d3982dbfe241f27b6064d4b767711329ca4db1af046e2f7f2d3 |
| IEDL.DBID | AGYKE |
| ISSN | 1432-7643 |
| IngestDate | Thu Apr 24 23:06:22 EDT 2025 Wed Oct 01 03:00:14 EDT 2025 Fri Feb 21 02:47:58 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 18 |
| Keywords | Multi-party security Synchronized authentication Secure computation Machine learning IoT |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c291t-c3b8ecd0066054d3982dbfe241f27b6064d4b767711329ca4db1af046e2f7f2d3 |
| ORCID | 0000-0002-1464-8401 |
| PageCount | 14 |
| ParticipantIDs | crossref_primary_10_1007_s00500_021_05864_5 crossref_citationtrail_10_1007_s00500_021_05864_5 springer_journals_10_1007_s00500_021_05864_5 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20210900 2021-09-00 |
| PublicationDateYYYYMMDD | 2021-09-01 |
| PublicationDate_xml | – month: 9 year: 2021 text: 20210900 |
| PublicationDecade | 2020 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg |
| PublicationSubtitle | A Fusion of Foundations, Methodologies and Applications |
| PublicationTitle | Soft computing (Berlin, Germany) |
| PublicationTitleAbbrev | Soft Comput |
| PublicationYear | 2021 |
| Publisher | Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin Heidelberg |
| References | Jegadeesan, Azees, Kumar, Manogaran, Chilamkurti, Varatharajan, Hsu (CR40) 2019; 49 Choi, In, Park, Seok, Seo, Kim (CR5) 2016; 74 Ghosh, Chakraborty, Law (CR8) 2018; 3 Wang, Bai, Lei, Zhao, Yang, Han (CR30) 2019; 7 Riad, Huang, Ke (CR24) 2020; 160 CR17 Zhou, Wang, Sun, Lv (CR39) 2018; 6 CR15 Qiu, Fan, Zhang, Pan, Li, Yang (CR23) 2019; 7 Dhillon, Kalra (CR7) 2018; 4 Li, Zhu, Xiong, Mo, Ying, Wang (CR14) 2019; 74 Yuan, Yuan, Li, Wang (CR35) 2019; 6 Ayoade, El-Ghamry, Karande, Khan, Alrahmawy, Rashad (CR2) 2018; 75 Wazid, Das, Bhat, Vasilakos (CR32) 2020; 150 He, Kumar, Zeadally, Vinel, Yang (CR11) 2017; 8 Ostad-Sharif, Arshad, Nikooghadam, Abbasinezhad-Mood (CR18) 2019; 100 Bu, Isakov, Kinsy (CR4) 2019; 92 Jurcut, Niculcea, Ranaweera, Le-Khac (CR12) 2020; 1 Zhang, Yu, Tian, Xu, Gao, Lin (CR38) 2020; 7 Santos, Carneiro, Franco, Teixeira, Henriques, Oliveira (CR27) 2020; 107 Liu, Wang, Zhang (CR16) 2020; 8 Preeth, Dhanalakshmi, Shakeel (CR21) 2019; 13 Sheron, Sridhar, Baskar, Shakeel (CR28) 2020; 31 CR29 Rizvi, Pipetti, Mcintyre, Todd, Williams (CR25) 2020; 11 Lee, Kang, Ryu, Won, Kim, Lee (CR13) 2020; 52 Bae, Kwak (CR3) 2020; 79 Hammi, Hammi, Bellot, Serhrouchni (CR10) 2018; 78 CR22 CR20 Zhang, Ren, Wu, Zhang, Cao, Zheng (CR37) 2019; 7 Salimi, Mala, Martin, Peris-Lopez (CR26) 2020; 8 Xi (CR33) 2019; 7 Wang, An, Chang (CR31) 2020; 8 Pešić, Ivanović, Radovanović, Bădică (CR19) 2020; 105 Zhang, Durresi, Durresi (CR36) 2018; 101 H Lee (5864_CR13) 2020; 52 5864_CR29 A Jurcut (5864_CR12) 2020; 1 M Salimi (5864_CR26) 2020; 8 L Wang (5864_CR31) 2020; 8 PF Sheron (5864_CR28) 2020; 31 J Choi (5864_CR5) 2016; 74 SSL Preeth (5864_CR21) 2019; 13 M Wazid (5864_CR32) 2020; 150 D Wang (5864_CR30) 2019; 7 PK Dhillon (5864_CR7) 2018; 4 D He (5864_CR11) 2017; 8 5864_CR20 K Riad (5864_CR24) 2020; 160 ML Santos (5864_CR27) 2020; 107 5864_CR22 P Zhang (5864_CR36) 2018; 101 Y Zhang (5864_CR37) 2019; 7 5864_CR17 A Ostad-Sharif (5864_CR18) 2019; 100 5864_CR15 WI Bae (5864_CR3) 2020; 79 S Jegadeesan (5864_CR40) 2019; 49 Q Li (5864_CR14) 2019; 74 S Pešić (5864_CR19) 2020; 105 J Qiu (5864_CR23) 2019; 7 X Yuan (5864_CR35) 2019; 6 A Ghosh (5864_CR8) 2018; 3 S Rizvi (5864_CR25) 2020; 11 L Bu (5864_CR4) 2019; 92 L Zhou (5864_CR39) 2018; 6 H Zhang (5864_CR38) 2020; 7 G Ayoade (5864_CR2) 2018; 75 MT Hammi (5864_CR10) 2018; 78 L Liu (5864_CR16) 2020; 8 Z Xi (5864_CR33) 2019; 7 |
| References_xml | – ident: CR22 – volume: 92 start-page: 101762 year: 2019 ident: CR4 article-title: A secure and robust scheme for sharing confidential information in IoT systems publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2018.09.007 – volume: 100 start-page: 882 year: 2019 end-page: 892 ident: CR18 article-title: Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme publication-title: Futur Gener Comput Syst doi: 10.1016/j.future.2019.04.019 – volume: 7 start-page: 114721 year: 2019 end-page: 114730 ident: CR37 article-title: Certificateless multi-party authenticated encryption for NB-IoT terminals in 5G networks publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2936123 – volume: 79 start-page: 15793 issue: 23 year: 2020 end-page: 15811 ident: CR3 article-title: Smart card-based secure authentication protocol in multi-server IoT environment publication-title: Multimed Tools Appl doi: 10.1007/s11042-017-5548-2 – volume: 7 start-page: 180205 year: 2019 end-page: 180217 ident: CR23 article-title: An efficient multi-message and multi-receiver signcryption scheme for heterogeneous smart mobile IoT publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2958089 – volume: 8 start-page: 95057 year: 2020 end-page: 95067 ident: CR16 article-title: Secure IoT data outsourcing with aggregate statistics and fine-grained access control publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2961413 – volume: 13 start-page: 1 year: 2019 end-page: 12 ident: CR21 article-title: An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks publication-title: Peer-to-Peer Netw Appl – volume: 3 start-page: 208 issue: 4 year: 2018 end-page: 218 ident: CR8 article-title: Artificial intelligence in Internet of things publication-title: CAAI Trans Intell Technol doi: 10.1049/trit.2018.1008 – volume: 160 start-page: 102633 year: 2020 ident: CR24 article-title: A dynamic and hierarchical access control for IoT in multi-authority cloud storage publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2020.102633 – volume: 75 start-page: 4684 issue: 8 year: 2018 end-page: 4709 ident: CR2 article-title: Secure data processing for IoT middleware systems publication-title: J Supercomput doi: 10.1007/s11227-018-2686-x – volume: 4 start-page: 141 issue: 3 year: 2018 end-page: 160 ident: CR7 article-title: Multi-factor user authentication scheme for IoT-based healthcare services publication-title: J Reliable Intell Environ doi: 10.1007/s40860-018-0062-5 – volume: 1 start-page: 1 issue: 4 year: 2020 end-page: 19 ident: CR12 article-title: Security considerations for internet of things: a survey publication-title: SN Comput Sci doi: 10.1007/s42979-020-00201-3 – volume: 8 start-page: 8821 year: 2020 end-page: 8833 ident: CR26 article-title: Full-resilient memory-optimum multi-party non-interactive key exchange publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2964038 – volume: 107 start-page: 102253 year: 2020 ident: CR27 article-title: FLAT: federated lightweight authentication for the Internet of Things publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2020.102253 – volume: 6 start-page: 3753 issue: 2 year: 2019 end-page: 3763 ident: CR35 article-title: Toward secure and scalable computation in internet of things data applications publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2018.2890728 – ident: CR29 – volume: 150 start-page: 102496 year: 2020 ident: CR32 article-title: LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2019.102496 – volume: 8 start-page: 2411 issue: 5 year: 2017 end-page: 2419 ident: CR11 article-title: Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversariesm" publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2017.2720159 – volume: 31 start-page: e3815 issue: 12 year: 2020 ident: CR28 article-title: A decentralized scalable security framework for end-to-end authentication of future IoT communication publication-title: Trans Emerg Telecommun Technol – volume: 74 start-page: 389 issue: 7–8 year: 2019 end-page: 400 ident: CR14 article-title: Fine-grained multi-authority access control in IoT-enabled mHealth publication-title: Ann Telecommun doi: 10.1007/s12243-018-00702-6 – volume: 7 start-page: 56606 year: 2019 end-page: 56616 ident: CR33 article-title: Research on underwater wireless sensor network and MAC protocol and location algorithm publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2901375 – volume: 105 start-page: 102125 year: 2020 ident: CR19 article-title: CAAVI-RICS model for observing the security of distributed IoT and edge computing systems publication-title: Simul Model Pract Theory doi: 10.1016/j.simpat.2020.102125 – volume: 74 start-page: 3521 issue: 8 year: 2016 end-page: 3535 ident: CR5 article-title: Secure IoT framework and 2D architecture for End-To-End security publication-title: J Supercomput doi: 10.1007/s11227-016-1684-0 – volume: 101 start-page: 729 issue: 7 year: 2018 end-page: 742 ident: CR36 article-title: Multi-access edge computing aided mobility for privacy protection in internet of things publication-title: Computing doi: 10.1007/s00607-018-0639-0 – volume: 6 start-page: 43472 year: 2018 end-page: 43488 ident: CR39 article-title: BeeKeeper: A blockchain-based IoT system with secure storage and homomorphic computation publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2847632 – volume: 11 start-page: 100240 year: 2020 ident: CR25 article-title: Threat model for securing internet of things (IoT) network at device-level publication-title: Internet of Things doi: 10.1016/j.iot.2020.100240 – volume: 7 start-page: 54508 year: 2019 end-page: 54521 ident: CR30 article-title: Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2913438 – ident: CR15 – ident: CR17 – volume: 78 start-page: 126 year: 2018 end-page: 142 ident: CR10 article-title: Bubbles of trust: a decentralized blockchain-based authentication system for IoT publication-title: Comput Secur doi: 10.1016/j.cose.2018.06.004 – volume: 49 start-page: 101522 year: 2019 ident: CR40 article-title: An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications publication-title: Sustain Cities Soc doi: 10.1016/j.scs.2019.101522 – volume: 8 start-page: 97267 year: 2020 end-page: 97278 ident: CR31 article-title: Security enhancement on a lightweight authentication scheme with anonymity fog computing architecture publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2996264 – volume: 52 start-page: 102494 year: 2020 ident: CR13 article-title: A three-factor anonymous user authentication scheme for Internet of Things environments publication-title: J Inf Secur Appl – ident: CR20 – volume: 7 start-page: 2968 issue: 4 year: 2020 end-page: 2981 ident: CR38 article-title: Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.2964015 – volume: 13 start-page: 1 year: 2019 ident: 5864_CR21 publication-title: Peer-to-Peer Netw Appl – volume: 52 start-page: 102494 year: 2020 ident: 5864_CR13 publication-title: J Inf Secur Appl – volume: 74 start-page: 3521 issue: 8 year: 2016 ident: 5864_CR5 publication-title: J Supercomput doi: 10.1007/s11227-016-1684-0 – volume: 7 start-page: 114721 year: 2019 ident: 5864_CR37 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2936123 – volume: 3 start-page: 208 issue: 4 year: 2018 ident: 5864_CR8 publication-title: CAAI Trans Intell Technol doi: 10.1049/trit.2018.1008 – volume: 11 start-page: 100240 year: 2020 ident: 5864_CR25 publication-title: Internet of Things doi: 10.1016/j.iot.2020.100240 – volume: 8 start-page: 97267 year: 2020 ident: 5864_CR31 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2996264 – volume: 8 start-page: 2411 issue: 5 year: 2017 ident: 5864_CR11 publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2017.2720159 – volume: 7 start-page: 56606 year: 2019 ident: 5864_CR33 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2901375 – ident: 5864_CR17 doi: 10.1007/s10207-019-00484-5 – volume: 78 start-page: 126 year: 2018 ident: 5864_CR10 publication-title: Comput Secur doi: 10.1016/j.cose.2018.06.004 – volume: 49 start-page: 101522 year: 2019 ident: 5864_CR40 publication-title: Sustain Cities Soc doi: 10.1016/j.scs.2019.101522 – volume: 6 start-page: 43472 year: 2018 ident: 5864_CR39 publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2847632 – volume: 7 start-page: 2968 issue: 4 year: 2020 ident: 5864_CR38 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.2964015 – volume: 100 start-page: 882 year: 2019 ident: 5864_CR18 publication-title: Futur Gener Comput Syst doi: 10.1016/j.future.2019.04.019 – volume: 107 start-page: 102253 year: 2020 ident: 5864_CR27 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2020.102253 – ident: 5864_CR29 doi: 10.4018/978-1-5225-2947-7.ch011 – ident: 5864_CR15 doi: 10.1007/s11036-019-01490-6 – ident: 5864_CR20 doi: 10.1007/s12652-018-1154-z – volume: 160 start-page: 102633 year: 2020 ident: 5864_CR24 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2020.102633 – volume: 6 start-page: 3753 issue: 2 year: 2019 ident: 5864_CR35 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2018.2890728 – volume: 7 start-page: 54508 year: 2019 ident: 5864_CR30 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2913438 – volume: 8 start-page: 8821 year: 2020 ident: 5864_CR26 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2964038 – volume: 92 start-page: 101762 year: 2019 ident: 5864_CR4 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2018.09.007 – ident: 5864_CR22 doi: 10.1007/s10586-019-03036-7 – volume: 1 start-page: 1 issue: 4 year: 2020 ident: 5864_CR12 publication-title: SN Comput Sci doi: 10.1007/s42979-020-00201-3 – volume: 7 start-page: 180205 year: 2019 ident: 5864_CR23 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2958089 – volume: 4 start-page: 141 issue: 3 year: 2018 ident: 5864_CR7 publication-title: J Reliable Intell Environ doi: 10.1007/s40860-018-0062-5 – volume: 79 start-page: 15793 issue: 23 year: 2020 ident: 5864_CR3 publication-title: Multimed Tools Appl doi: 10.1007/s11042-017-5548-2 – volume: 74 start-page: 389 issue: 7–8 year: 2019 ident: 5864_CR14 publication-title: Ann Telecommun doi: 10.1007/s12243-018-00702-6 – volume: 150 start-page: 102496 year: 2020 ident: 5864_CR32 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2019.102496 – volume: 75 start-page: 4684 issue: 8 year: 2018 ident: 5864_CR2 publication-title: J Supercomput doi: 10.1007/s11227-018-2686-x – volume: 101 start-page: 729 issue: 7 year: 2018 ident: 5864_CR36 publication-title: Computing doi: 10.1007/s00607-018-0639-0 – volume: 105 start-page: 102125 year: 2020 ident: 5864_CR19 publication-title: Simul Model Pract Theory doi: 10.1016/j.simpat.2020.102125 – volume: 8 start-page: 95057 year: 2020 ident: 5864_CR16 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2961413 – volume: 31 start-page: e3815 issue: 12 year: 2020 ident: 5864_CR28 publication-title: Trans Emerg Telecommun Technol doi: 10.1002/ett.3815 |
| SSID | ssj0021753 |
| Score | 2.3139787 |
| Snippet | The heterogeneous nature of the Internet of Things (IoT) requires sophisticated and distributed security schemes for providing reliable communication. However,... |
| SourceID | crossref springer |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 12131 |
| SubjectTerms | Artificial Intelligence Computational Intelligence Control Engineering Focus Mathematical Logic and Foundations Mechatronics Robotics |
| Title | Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices |
| URI | https://link.springer.com/article/10.1007/s00500-021-05864-5 |
| Volume | 25 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1433-7479 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: AFBBN dateStart: 19970401 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1433-7479 dateEnd: 20241105 omitProxy: true ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: BENPR dateStart: 20090101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1433-7479 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1433-7479 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: U2A dateStart: 19970404 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED7RdoGBN6I8Kg8MIEjVOE6djuVRCohOrQRTFL9EBWoQTQf49ZxdpwKEkNgdy_Kdfd_Fd98HcMRUmFgaqqAluMQEpdUKRMKjoNNiodEMgwK3Dc73g3Z_xG4f4gffFDYtq93LJ0l3Uy-a3SxVCc5JMf2NkzYL4grUHN9WFWrd68e7q0Wi5dknEQogesSQ65tlfp_le0D6_hrqgkxvDUbl8ua1Jc_NWSGa8uMHc-N_178Oqx51ku7cTTZgSU82Ya1UdCD-gG_Cyhd6wi0YX1pWXSuIpRVxlYfBK3raO5l60Tsi3QzOuMSUZV4EcTB5smU2OXqnzmdTMnb_HXVBckMKpxRKjm_y4QlR2t1U2zDqXQ0v-oGXZggk7YRFICORaKksYEHMp6JOQpUwGuGAoVxgUsQUE7zNuROylxlTIswM5uKaGm6oinagOsknehcIM4prmknDWMY6USRYnDGm2wh8EhFJVYewtE8qPW-5lc94SReMy25nU9zZ1O1sGtfhdPHN65y148_RZ6XFUn-Cp38M3_vf8H1Yps7oti7tAKrF20wfIpApRAP9tnd-Pmh4_21AZUS7n5YT6o0 |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagDMDAo4AoTw8MIIiUOE6cjBVQtdB2aqVuUfwSlVBT0XTg33N2nYhKqBK74-Hu7Psuvvs-hO6oDBJDQ-X5nAkoUHzf4wkLvdSngVYUkgIzA86DYdwd07dJNHFDYYuq2716krQ3dT3sZqhKYE8C5W-UxNSLttGOIbAyjPlj0q7LLMc9CUAAsCMkXDcq8_ce6-lo_S3UppjOETpw2BC3V848Rltq1kSHle4CdsewifZ_kQieoOmL4b41slVKYtsf6M0hHr7xwknTYWF3sC7AumrGwoBW8YdphikghlSxXOCp_TuoSlxoXFo9T3zfK0YPWCp7n5yiced19Nz1nICCJ0galJ4IeaKENLACkJkM04RIrhUkbU0Yh9KFSspZzJiVmxc5lTzINVTMimimiQzPUGNWzNQ5wlRLpkguNKU5TcOQ0yinVMUATxIeCtlCQWXHTDh2cSNy8ZnVvMjW9hnYPrO2z6IWeqy_ma-4NTaufqrck7lzttiw_OJ_y2_Rbnc06Gf93vD9Eu0RGyKmk-wKNcqvpboG6FHyGxtpP44yzhs |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60gujBR1Wszz14UDQ02WyyyVGspfVRPLTQW8i-sCBJsenBf-_sNgktSMH7Zg8zszvfZGe-D6EbKr3I0FA5LmcCChTXdXjEfCd2qacVhaTAzIDz-yDsjejLOBgvTfHbbvfqSXIx02BYmrKiPZW6XQ--GdoS2J9AKRxEIXWCTbRFDVECRPSIPNYlV8lDCaAAcCQk33Js5u89VlPT6ruoTTfdA7RX4kT8uHDsIdpQWRPtVxoMuDySTbS7RCh4hCYdw4NrJKyUxLZX0JlCbPzgWSlTh4XdwboD66oxCwNyxZ-mMSaHeFL5fIYn9k-hKnCucWG1PfFtPx_eYans3XKMRt3n4VPPKcUUHEFir3CEzyMlpIEYgNKkH0dEcq0ggWvCOJQxVFLOQsas9LxIqeReqqF6VkQzTaR_ghpZnqlThKmWTJFUaEpTGvs-p0FKqQoBqkTcF7KFvMqOiSiZxo3gxVdScyRb2ydg-8TaPgla6L7-Zrrg2Vi7-qFyT1Keudma5Wf_W36Ntj863eStP3g9RzvERohpKrtAjeJ7ri4BhRT8ygbaL6fp0lc |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Distributed+multi-party+security+computation+framework+for+heterogeneous+internet+of+things+%28IoT%29+devices&rft.jtitle=Soft+computing+%28Berlin%2C+Germany%29&rft.au=Al-Otaibi%2C+Yasser+D.&rft.date=2021-09-01&rft.issn=1432-7643&rft.eissn=1433-7479&rft.volume=25&rft.issue=18&rft.spage=12131&rft.epage=12144&rft_id=info:doi/10.1007%2Fs00500-021-05864-5&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s00500_021_05864_5 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1432-7643&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1432-7643&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1432-7643&client=summon |